Information Technology Services
Information Technology Services

Best Practices

Mobile Device Security

phone iconNow more than ever, tablets and smartphones are allowing users to access data from just about anywhere. We use our mobile devices to stay in touch, take pictures, shop, bank, listen to music, connect through social media and work flexibly away from the office. Whether used personally or professionally, these devices often contain sensitive or confidential data. Many of the attacks previously seen through PCs are now being targeted at mobile device users. Keep your phone secure by following these guidelines.

Use a strong password
Strong passwords or PINs lock your device and protect your data from being accessed by others.Enable the feature that will erase the phone if someone tries to guess the PIN or password too many times. Turn on the service or download an app that helps you find your phone if if it lost or stolen. These apps allow you to remotely locate your phone, lock it, and/or erase your data.
Install updates
Ensure that you regularly install updates to your system and applications. Updates provides remedies for known and reported bugs or security vulnerabilities and not just functionality.
Know how to wipe your device remotely
If you store confidential data (or Queen's data) on your device, it is important to know how it can be remotely wiped if the device is lost or stolen. It is best to consult your device's manufacturer for instructions on how to do this as not every device or model of phone has this feature. If you check your Queen's email on your device, you can Wipe Your Device through Office 365.
Don't "jailbreak" or "root" your phone
Most phones will run only software that their operating system trusts. Jailbreaking or Rooting a phone enables it to run untrusted software, which is much more likely to carry a harmful virus.
Only install apps from trusted sources
Research the app before downloading to make sure it is trusted. Although some apps may not intentionally be malicious or contain malware, app security is not standardized in the same way that professional software is; anyone can create and distribute apps.
Only grant app permissions when needed
When an application asks for permission to access your photos, camera, location, contacts,etc. make sure to only grant access if needed. Try to limit access when needed to only while using the application, and disable use in the background.
Use a secured internet access connection whenever possible
Avoid using open Wi-Fi connections for performing secure operations (such as signing into email, Facebook, etc.). When on campus, use the QueensuSecure_WPA2 wireless network instead of the unsecured queensu wireless network. You should be able to set your device to remember your username and password for this network so you don't have to sign in every time.